<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Local Analysis Malware and WildFire Malware Alerts in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/local-analysis-malware-and-wildfire-malware-alerts/m-p/1251874#M9242</link>
    <description>&lt;P&gt;What&amp;nbsp;susekar avoided to respond to is why &lt;SPAN&gt;Local Analysis Module is suddenly flagging these executables on its own when WildFire is out of reach and why hasn't Palo Alto adjusted its machine learning to tackle this issue.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 08 Apr 2026 14:58:10 GMT</pubDate>
    <dc:creator>rufat87</dc:creator>
    <dc:date>2026-04-08T14:58:10Z</dc:date>
    <item>
      <title>Local Analysis Malware and WildFire Malware Alerts</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/local-analysis-malware-and-wildfire-malware-alerts/m-p/1246743#M9056</link>
      <description>&lt;P&gt;Can someone explain the Local Analysis Malware and WildFire Malware alerts. The WildFire alerts seem straightforward for a file that it deems malware. On the other hand, the local analysis malware alerts trigger for a bunch of files but in the alert it has a wildfire report and verdict that says benign.&amp;nbsp;&lt;BR /&gt;Moving into suppressing these alerts, the module in the alert is listed as Local File Analysis and Wildfire. When adding the file to an exception, neither of those are a module choice to whitelist from. Under the assumption it was scanning based on the alert, I have tried adding it to the endpoint scanning and the PE and DLL examination modules but the alerts still trigger. Any help or explanation would be appreciated!&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jan 2026 16:36:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/local-analysis-malware-and-wildfire-malware-alerts/m-p/1246743#M9056</guid>
      <dc:creator>clairamore</dc:creator>
      <dc:date>2026-01-27T16:36:20Z</dc:date>
    </item>
    <item>
      <title>Re: Local Analysis Malware and WildFire Malware Alerts</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/local-analysis-malware-and-wildfire-malware-alerts/m-p/1246865#M9061</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1656590803"&gt;@clairamore&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you referring to the Local Analysis detections for the Microsoft binary &lt;EM data-start="211" data-end="238"&gt;StoreDesktopExtension.exe&lt;/EM&gt;? If so, please find the responses below. If your question is more general, kindly let me know.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="test-id__field-label-container slds-form-element__label"&gt;&lt;STRONG&gt;&lt;SPAN class="test-id__field-label"&gt;Summary:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV class="slds-form-element__control"&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow word-break-ie11 is-read-only"&gt;Local Analysis Module is generating False Positive (FP) issues/alerts on Windows endpoints for the Microsoft binary StoreDesktopExtension.exe. The verdict has been validated by the research team and updated in Wildfire.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="slds-form-element__control"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="slds-form-element__control"&gt;
&lt;DIV class="test-id__field-label-container slds-form-element__label"&gt;&lt;STRONG&gt;&lt;SPAN class="test-id__field-label"&gt;Symptom:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV class="slds-form-element__icon"&gt;&lt;SPAN&gt;Customers have reported multiple alerts related to the unsigned Microsoft binary that has been distributed at least since January 2026.&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="slds-form-element__control"&gt;
&lt;DIV class="outputRichText"&gt;
&lt;P&gt;Indicators:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;StoreDesktopExtension.exe&lt;/LI&gt;
&lt;LI&gt;SHA256 - ADEE0EC3096B4778F6A5951647371F3FF67B8FA0D96C37FB795BCFCFE0E1154E.&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="test-id__field-label-container slds-form-element__label"&gt;&lt;STRONG&gt;&lt;SPAN class="test-id__field-label"&gt;Cause:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV class="slds-form-element__icon"&gt;&lt;SPAN&gt;The root cause of the recurring False Positive (FP) is the detection by the Local Analysis module after it is unable to verify the WildFire verdict.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="slds-form-element__control"&gt;
&lt;DIV class="outputRichText"&gt;
&lt;P&gt;The main issue to investigate is why the endpoint is not reaching the WildFire cloud.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The following reasons have been observed so far due to the customer environment:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Access from the endpoint to the WildFire cloud is blocked in the customer firewall&lt;/LI&gt;
&lt;LI&gt;Deep packet inspection (DPI) is opening the SSL connection, forcing the agent to drop the connection to WildFire&lt;/LI&gt;
&lt;LI&gt;A combination of DPI plus Certificate Enforcement setting enabled in the Agent Settings policy&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="test-id__field-label-container slds-form-element__label"&gt;&lt;STRONG&gt;&lt;SPAN class="test-id__field-label"&gt;Resolution&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV class="slds-form-element__icon"&gt;&lt;SPAN&gt;There are currently two approaches to resolve this issue.&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="slds-form-element__icon"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="slds-form-element__control"&gt;
&lt;DIV class="outputRichText"&gt;
&lt;P&gt;-One is temporary, and will work for this specific file as long as the hash doesn't change for any reason.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-The permanent fix is to ensure the XDR Agent can reach the WildFire cloud in order to obtain the latest verdicts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Both require an agent check-in as a final step to refresh the local databases.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The temporary workaround for this specific hash is to add it to the Allow List:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Open the XSIAM Tenant UI&lt;/LI&gt;
&lt;LI&gt;Navigate to Investigation &amp;amp; Response → Action Center&lt;/LI&gt;
&lt;LI&gt;Press the +New Action button&lt;/LI&gt;
&lt;LI&gt;Select the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;Add to allow list&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;action in the list.&lt;/LI&gt;
&lt;LI&gt;Add the Hash&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;ADEE0EC3096B4778F6A5951647371F3FF67B8FA0D96C37FB795BCFCFE0E1154&lt;/EM&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Add a comment that will help identify this change&lt;/LI&gt;
&lt;LI&gt;Follow through the next pages to apply the workaround&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;-------------------------------------------------------&lt;/P&gt;
&lt;P&gt;For a permanent fix, the root cause of the XDR Agent not reaching WildFire must be investigated and corrected.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Ensure the endpoints are allowed to reach the resources published in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XSIAM/Cortex-XSIAM-Documentation/Enable-access-to-required-PANW-resources" target="_blank" rel="noopener"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XSIAM/Cortex-XSIAM-Documentation/Enable-access-to-required-PANW-resources&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Specifically, ensure the following FQDN can be reached on port TCP/443:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;CODE&gt;cc-&lt;EM&gt;&amp;lt;xsiam-tenant&amp;gt;&lt;/EM&gt;.traps.paloaltonetworks.com&lt;/CODE&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Review the Tech Support File, specifically the traps.d log and look for issues with the verdict FQDN from step 2.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Happy New year!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 28 Jan 2026 14:31:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/local-analysis-malware-and-wildfire-malware-alerts/m-p/1246865#M9061</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-01-28T14:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: Local Analysis Malware and WildFire Malware Alerts</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/local-analysis-malware-and-wildfire-malware-alerts/m-p/1246871#M9062</link>
      <description>&lt;P&gt;Thanks Susekar but it is not in regard to that file. I have seen a lot of the local analysis malware alerts pop up for a bunch of different executables and DLLs but all of them have had benign wildfire scores.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 15:24:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/local-analysis-malware-and-wildfire-malware-alerts/m-p/1246871#M9062</guid>
      <dc:creator>clairamore</dc:creator>
      <dc:date>2026-01-28T15:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: Local Analysis Malware and WildFire Malware Alerts</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/local-analysis-malware-and-wildfire-malware-alerts/m-p/1251874#M9242</link>
      <description>&lt;P&gt;What&amp;nbsp;susekar avoided to respond to is why &lt;SPAN&gt;Local Analysis Module is suddenly flagging these executables on its own when WildFire is out of reach and why hasn't Palo Alto adjusted its machine learning to tackle this issue.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 14:58:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/local-analysis-malware-and-wildfire-malware-alerts/m-p/1251874#M9242</guid>
      <dc:creator>rufat87</dc:creator>
      <dc:date>2026-04-08T14:58:10Z</dc:date>
    </item>
  </channel>
</rss>

